Exploiting Software : How To Break Code
Saved in:
Main Author: | |
---|---|
Format: | TEXT |
Published: |
Addison-Wesley
|
Subjects: | |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
amikomlib-2441 |
---|---|
record_format |
oai_dc |
spelling |
amikomlib-24412016-08-08 00:00:00Resource Centre UNIVERSITAS AMIKOM YOGYAKARTAExploiting Software : How To Break CodeGreg HoglundPraise for Exploiting Software Exploiting Software highlights the most critical part of the software quality problem. As it turns out, software quality problems are a major contributing factor to computer security problems. Increasingly, companies large aAddison-WesleyTEXT |
institution |
Universitas Amikom Yogyakarta |
collection |
Perpustakaan Yogyakarta |
topic |
Praise for Exploiting Software Exploiting Software highlights the most critical part of the software quality problem. As it turns out, software quality problems are a major contributing factor to computer security problems. Increasingly, companies large a |
spellingShingle |
Praise for Exploiting Software Exploiting Software highlights the most critical part of the software quality problem. As it turns out, software quality problems are a major contributing factor to computer security problems. Increasingly, companies large a Greg Hoglund Exploiting Software : How To Break Code |
description |
|
format |
TEXT |
author |
Greg Hoglund |
author_facet |
Greg Hoglund |
author_sort |
Greg Hoglund |
title |
Exploiting Software : How To Break Code |
title_short |
Exploiting Software : How To Break Code |
title_full |
Exploiting Software : How To Break Code |
title_fullStr |
Exploiting Software : How To Break Code |
title_full_unstemmed |
Exploiting Software : How To Break Code |
title_sort |
exploiting software : how to break code |
publisher |
Addison-Wesley |
publishDate |
|
_version_ |
1742475574426730496 |